SlideShare a Scribd company logo
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
1
Management
Information Systems,
10/e
Raymond McLeod and George
Schell
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
2
Chapter 5
Computing and Communications
Resources
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
3
Learning Objectives
► Know the various computer components.
► Know about personal computing devices.
► Understand the implications of the rapid advances
in information and communication technologies.
► Be familiar with input and output resources.
► Recognize how different storage media differ and
the advantages of each.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
4
Learning Objectives (Cont’d)
► Know the advantages of prewritten software.
► Understand the different computer networking
strategies.
► Understand how communications over the public
telephone system and networks differ.
► Know about network protocols.
► Distinguish between intranets, extranets, and the
Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
5
Hardware & Processors
►Mainframes are large computers used for
centralized information systems.
►Microcomputers or PCs are computers
used by one person.
►Processor (CPU) is where data processing
is performed.
►Processor speed is measured by the # of
cycles that occur per second.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
6
Processors
►MHz stands for millions of cycles per
second.
►Word is the measure of how many bits can
be moved with one cycle of the processor.
►Word size is how many characters, “A”,
can be moved in a single cycle of the
processor.
►Power is affected by both word size &
processor speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
7
Table 5.1 Major Computer
Components
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
8
Memory & Storage
►Memory (primary storage or RAM) is
the storage area on the computer’s circuit
board.
 Volatile
 Extremely fast
►Fixed storage is permanently installed in
the computer.
►Removable storage media – tape, disk,
CD, DVD, USB flash drive, etc.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
9
Figure 5.2 Motherboard
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
10
Input Devices
►Human-captured data refers to input
captured by a person typing on a keyboard,
clicking a mouse, speaking into a
microphone, or a similar interaction.
►Machine-captured data is data captured
by an electronic or mechanical device.
►Point-of-sale terminals are scanners
used in retail stores.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
11
Output Devices
►Monitor
 Screen resolution, size 17-19’’ diagonals.
 Graphic user interface (GUI).
►Printers
 Lasers are like copier machines.
 Ink-jets spray ink.
►Multimedia is the use of more than 1
medium at a time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
12
Personal Computing Devices
►Cell phones with interactive messaging &
video
►Smart cell phones are phones that perform
tasks associated with PCs i.e. BlackBerry
7270, Treo 650.
►Global Systems for Mobile
Communications (GSM) digital cellular
phone protocol.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
13
Home Networks
►Home computer networks assess the
Internet via cable modems or DSL
modems.
►Setup usually requires the modem, network
card(s), wireless router.
►Wireless security uses Wired equivalent
privacy (WEP) which encrypts the data
transferred between the computer &
wireless router.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
14
Home Computing Security
►Updates for OS an application software.
 For security & efficiency.
 Microsoft Update.
►Hackers are people who try to break into
computer systems in order to
 Gather information;
 Deny the owner access to his resources;
 Delete files;
 Disrupt the use by the owner.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
15
Home Computing Security (Cont’d)
►Viruses are small computer programs that
replicate by inserting themselves into
computer resources such as programs or
files.
►Worms are self-contained files or programs
 Does not have to attach to program or file.
 Can delete, change files, send e-mails, and
cause problems.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
16
Home Computing Security (Cont’d)
►Denial-of-service attack is when the user
is denied access to the services of the
computer because it is overwhelmed with e-
mail.
►Antivirus software – Norton, MacAfee,
etc. Keep virus definitions updated
►Spyware – Microsoft Defender, Lavasoft
Ad-Aware, etc. Free from Microsoft.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
17
Software
►System software (OS) performs certain
tasks that all computers require.
 Hardware interfaces, device drivers.
 Manage computer’s processes.
 OS – Windows XP, Unix, Mac OS X, Linux.
►Application software processes the user’s
data.
►Prewritten application software is
produced by suppliers and sold to users.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
18
Application Software
►Custom application software is when
programmers for the business write the
software.
►User-written software in End-User
Computing is created by the user, such as
Excel Macros, Access Wizards.
►User-friendly software is computer
software that is simple & intuitive to use.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
19
Communications
►Protocol is the specification for formatting
data to be transferred between
communications equipment.
►Public connections
 Telephone modems
 Integrated Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
20
Table 5.4 Connecting to the Internet
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
21
Communications (Cont’d)
►Packet is a piece of the total data to be
communicated, includes sender & receiver
addresses.
►Cable modems connect to the Internet via
coaxial cable.
►Asynchronous transfer mode (ATM)
 Improve data transmission rates.
 Increased speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
22
Private Line
►Circuit is a connection that is always
connected.
►Private line is a circuit that is always open
to your communication traffic.
 T-1 line over 1.5 Mbps; T-3 at 43 Mbps.
 Multiplexed is when the line is broken into
separate lanes of communication.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
23
Virtual Private Networks
► Virtual Private Networks (VPNs) allow you to
use the security & speed of a private line but still
use the low-cost Internet.
► Tunneling software establishes the set of
intermediary locations of the telephone equipment
that will host a given data communications
transfer.
► Privacy is attained because the tunnel is not
established unless the sending & receiving
computers authenticate one another.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
24
Communications - Networks
► Open Systems Interconnection (OSI)
standard architecture for network connections
established by the ISO.
► Terminal is a device that has no storage or
processor; it allows for entering & displaying data
for the computer.
► Systems Network Architecture (SNA) is a
protocol for large computers; it polls other
computers connected by the network for transfers.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
25
Table 5.5 OSI Reference Model
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
26
Networks (Cont’d)
►Token ring is a peer-to-peer protocol
that allows each computer to act as its own
controller.
►Ethernet is an open protocol for peer-to-
peer communications.
 IEEE endorses
►Data transmission crash is when two
peer computers try to send data at the
same time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
27
Figure 5.11 Token Ring Protocol
Example
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
28
Networks (Cont’d)
►Data packet is a piece of the total data to
be communicated, combined with the
address of the destination computer, the
sending computer, and other control
information.
►Transmission Control
Protocol/Internet Protocol (TCP/IP)
 TCP conducts communication over the network.
 IP handles the packets so they can be routed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
29
Networks (Cont’d)
►IP address is a four-part set of numbers
(each from 0 to 255), separated by periods.
►Network interface card (NIC) is used to
attach a device to the communications
medium.
►Local Area Networks (LANs) is a group
of computers and other devices that are
connected together by a communications
medium.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
30
Table 5.6 Communications Network
Hardware
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
31
Networks (Cont’d)
►Medium used by LANs can be copper wire,
wireless, fiber-optics, or other media.
►LANs join computers that are physically
located together.
 Same room or building.
 Total distance is less than ½ mile.
 60 ft. between devices.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
32
Networks (Cont’d)
►Metropolitan area network (MAN) is a
network that has a physical distance limit of
roughly 30 miles.
►Wide are networks (WANs) are used to
connect computers and other devices when
the distance exceeds the constraints of
LANs & MANs.
 Uses common carrier, public telephone system.
 WANs have been replaced by the Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
33
Internet, Intranet & Extranet
►Internet is just a collection of networks
that can be joined together; Public.
►Intranet uses the same network protocols
as the Internet but limits accessibility to
computer resources to a select group of
persons in the organization.
►Extranet is when the intranet is expanded
to include users beyond the firm; Trusted
customers & business partners.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
34
Convergence of Computing &
Communications
►Computing devices & communications
devices are now incorporating features of
the other into themselves.
►Voice over Internet Protocol (VoIP) is
the routing of voice communications over
the Internet as if they were digital
communications.
 WWW.SKYPE.COM – free software
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
35
Mainframe Computer
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
36
Personal Computer (PC)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
37
PC System
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
38
Static RAM / SRAM Dinamic RAM / DRAM
EDORAM
(Extended Data
Out RAM )
72 pin
SDRAM
168 pin
PROM
EPROM
EEPROM
Memory
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
39
Hard disk
Removable Storage
Floppy disk
Floppy drive
CD
Flash disk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
40
Cylinder, sector, track pada harddisk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
41
Hard disk layout
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
42
Input Device
Keyboard
Mouse
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
43
Monitor
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
44
Printer & Plotter
Printer Dot Matrik
Printer Ink Jet
Plotter

More Related Content

What's hot

Memahami 4 Perspektif BALANCED SCORECARD
Memahami  4 Perspektif BALANCED SCORECARDMemahami  4 Perspektif BALANCED SCORECARD
Memahami 4 Perspektif BALANCED SCORECARD
Kanaidi ken
 
Perencanaan dan pengendalian kegiatan logistik
Perencanaan dan pengendalian kegiatan logistikPerencanaan dan pengendalian kegiatan logistik
Perencanaan dan pengendalian kegiatan logistik
Togar Simatupang
 
konsep-konsep dasar (pengantar sistem informasi)
konsep-konsep dasar (pengantar sistem informasi)konsep-konsep dasar (pengantar sistem informasi)
konsep-konsep dasar (pengantar sistem informasi)Allan Cai
 
EKSI 4203 - Modul 4 Penilaian Saham
 EKSI 4203 - Modul 4 Penilaian Saham EKSI 4203 - Modul 4 Penilaian Saham
EKSI 4203 - Modul 4 Penilaian Saham
Ancilla Kustedjo
 
Bab 13 akuntansi biaya kelompok. 3
Bab 13 akuntansi biaya kelompok. 3Bab 13 akuntansi biaya kelompok. 3
Bab 13 akuntansi biaya kelompok. 3
SumantoYuandaPutra
 
Perencanaan strategis
Perencanaan strategisPerencanaan strategis
Perencanaan strategis
Indra Diputra
 
Portofolio investasi-bab-11-penilaian-saham
Portofolio investasi-bab-11-penilaian-sahamPortofolio investasi-bab-11-penilaian-saham
Portofolio investasi-bab-11-penilaian-saham
Judianto Nugroho
 
EKSI 4203 - Modul 3 Model-Model Keseimbangan
EKSI 4203  - Modul 3 Model-Model KeseimbanganEKSI 4203  - Modul 3 Model-Model Keseimbangan
EKSI 4203 - Modul 3 Model-Model Keseimbangan
Ancilla Kustedjo
 
Perilaku konsumen dalam memilih produk samsung
Perilaku konsumen dalam memilih produk samsungPerilaku konsumen dalam memilih produk samsung
Perilaku konsumen dalam memilih produk samsung
Azieeb Iqbal
 
Presentasi management logistic
Presentasi management logisticPresentasi management logistic
Presentasi management logisticGina Restu Putri
 
Tugas 1 manajemen risiko dan asuransi
Tugas 1 manajemen risiko dan asuransiTugas 1 manajemen risiko dan asuransi
Tugas 1 manajemen risiko dan asuransi
Han Doko
 
Pengertian data base
Pengertian data basePengertian data base
Pengertian data base
Ananta Aprillia
 
Manajemen keuangan bab 05
Manajemen keuangan bab 05Manajemen keuangan bab 05
Manajemen keuangan bab 05Lia Ivvana
 
Latihan uts manajemen bisnis
Latihan uts manajemen bisnisLatihan uts manajemen bisnis
Latihan uts manajemen bisnis
Bina Sarana Informatika
 
Single Index Model (SIM) & Capital Asset Pricing Model (CAPM) by Arshad Liantono
Single Index Model (SIM) &Capital Asset Pricing Model (CAPM) by Arshad LiantonoSingle Index Model (SIM) &Capital Asset Pricing Model (CAPM) by Arshad Liantono
Single Index Model (SIM) & Capital Asset Pricing Model (CAPM) by Arshad Liantono
Arshad Liantono
 
Matematika bisnis-kel-8
Matematika bisnis-kel-8Matematika bisnis-kel-8
Matematika bisnis-kel-8Haidar Bashofi
 
Bab 15 regresi
Bab 15 regresiBab 15 regresi
Bab 15 regresi
farah fauziah
 
Sistem informasi manufaktur
Sistem informasi manufakturSistem informasi manufaktur
Sistem informasi manufaktur
universitas indraprasta
 
BUSINESS LEVEL STRATEGY
BUSINESS LEVEL STRATEGYBUSINESS LEVEL STRATEGY
BUSINESS LEVEL STRATEGY
Alfrianty Sauran
 

What's hot (20)

Memahami 4 Perspektif BALANCED SCORECARD
Memahami  4 Perspektif BALANCED SCORECARDMemahami  4 Perspektif BALANCED SCORECARD
Memahami 4 Perspektif BALANCED SCORECARD
 
Perencanaan dan pengendalian kegiatan logistik
Perencanaan dan pengendalian kegiatan logistikPerencanaan dan pengendalian kegiatan logistik
Perencanaan dan pengendalian kegiatan logistik
 
konsep-konsep dasar (pengantar sistem informasi)
konsep-konsep dasar (pengantar sistem informasi)konsep-konsep dasar (pengantar sistem informasi)
konsep-konsep dasar (pengantar sistem informasi)
 
EKSI 4203 - Modul 4 Penilaian Saham
 EKSI 4203 - Modul 4 Penilaian Saham EKSI 4203 - Modul 4 Penilaian Saham
EKSI 4203 - Modul 4 Penilaian Saham
 
Bab 13 akuntansi biaya kelompok. 3
Bab 13 akuntansi biaya kelompok. 3Bab 13 akuntansi biaya kelompok. 3
Bab 13 akuntansi biaya kelompok. 3
 
Perencanaan strategis
Perencanaan strategisPerencanaan strategis
Perencanaan strategis
 
Portofolio investasi-bab-11-penilaian-saham
Portofolio investasi-bab-11-penilaian-sahamPortofolio investasi-bab-11-penilaian-saham
Portofolio investasi-bab-11-penilaian-saham
 
EKSI 4203 - Modul 3 Model-Model Keseimbangan
EKSI 4203  - Modul 3 Model-Model KeseimbanganEKSI 4203  - Modul 3 Model-Model Keseimbangan
EKSI 4203 - Modul 3 Model-Model Keseimbangan
 
Perilaku konsumen dalam memilih produk samsung
Perilaku konsumen dalam memilih produk samsungPerilaku konsumen dalam memilih produk samsung
Perilaku konsumen dalam memilih produk samsung
 
Presentasi management logistic
Presentasi management logisticPresentasi management logistic
Presentasi management logistic
 
Tugas 1 manajemen risiko dan asuransi
Tugas 1 manajemen risiko dan asuransiTugas 1 manajemen risiko dan asuransi
Tugas 1 manajemen risiko dan asuransi
 
Pengertian data base
Pengertian data basePengertian data base
Pengertian data base
 
Manajemen keuangan bab 05
Manajemen keuangan bab 05Manajemen keuangan bab 05
Manajemen keuangan bab 05
 
Latihan uts manajemen bisnis
Latihan uts manajemen bisnisLatihan uts manajemen bisnis
Latihan uts manajemen bisnis
 
Single Index Model (SIM) & Capital Asset Pricing Model (CAPM) by Arshad Liantono
Single Index Model (SIM) &Capital Asset Pricing Model (CAPM) by Arshad LiantonoSingle Index Model (SIM) &Capital Asset Pricing Model (CAPM) by Arshad Liantono
Single Index Model (SIM) & Capital Asset Pricing Model (CAPM) by Arshad Liantono
 
Matematika bisnis-kel-8
Matematika bisnis-kel-8Matematika bisnis-kel-8
Matematika bisnis-kel-8
 
Klasifikasi biaya
Klasifikasi biayaKlasifikasi biaya
Klasifikasi biaya
 
Bab 15 regresi
Bab 15 regresiBab 15 regresi
Bab 15 regresi
 
Sistem informasi manufaktur
Sistem informasi manufakturSistem informasi manufaktur
Sistem informasi manufaktur
 
BUSINESS LEVEL STRATEGY
BUSINESS LEVEL STRATEGYBUSINESS LEVEL STRATEGY
BUSINESS LEVEL STRATEGY
 

Similar to SIM - Mc leod ch05

MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
Welly Tjoe
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
ENRIQUE EGLESIAS
 
Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_
Ninie Sharil
 
Netwoking
NetwokingNetwoking
Netwoking
Vishakha Singhal
 
niceData com.
niceData com.niceData com.
niceData com.
janiceramirez07
 
niceData com.
niceData com.niceData com.
niceData com.
janiceramirez07
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
ssuser2cc0d4
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
Aneesh Zutshi
 
Mini final docmtn final
Mini final docmtn finalMini final docmtn final
Mini final docmtn final
Ayesha Mubeen
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
SherefHesham
 
5[1]
5[1]5[1]
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
RAJSEKHAR PEDINA
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
Musab58
 
Basic networking
Basic networkingBasic networking
Basic networking
Siddique Ibrahim
 
Modules1
Modules1Modules1
Modules1
websec69
 
Introduction-to-Computer-Technologies.pptx
Introduction-to-Computer-Technologies.pptxIntroduction-to-Computer-Technologies.pptx
Introduction-to-Computer-Technologies.pptx
faseda5516
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
HodaKHajeh1
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
cockekeshia
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 

Similar to SIM - Mc leod ch05 (20)

MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
 
Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_
 
Netwoking
NetwokingNetwoking
Netwoking
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
 
Mini final docmtn final
Mini final docmtn finalMini final docmtn final
Mini final docmtn final
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
5[1]
5[1]5[1]
5[1]
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Modules1
Modules1Modules1
Modules1
 
Introduction-to-Computer-Technologies.pptx
Introduction-to-Computer-Technologies.pptxIntroduction-to-Computer-Technologies.pptx
Introduction-to-Computer-Technologies.pptx
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 

More from Welly Tjoe

SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
Welly Tjoe
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
Welly Tjoe
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
Welly Tjoe
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
Welly Tjoe
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
Welly Tjoe
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
Welly Tjoe
 
SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
Welly Tjoe
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
Welly Tjoe
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
Welly Tjoe
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
Welly Tjoe
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
Welly Tjoe
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edarWelly Tjoe
 

More from Welly Tjoe (13)

Etika bisnis
Etika bisnisEtika bisnis
Etika bisnis
 
SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
 
SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edar
 

Recently uploaded

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 

SIM - Mc leod ch05

  • 1. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and George Schell
  • 2. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 2 Chapter 5 Computing and Communications Resources
  • 3. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 3 Learning Objectives ► Know the various computer components. ► Know about personal computing devices. ► Understand the implications of the rapid advances in information and communication technologies. ► Be familiar with input and output resources. ► Recognize how different storage media differ and the advantages of each.
  • 4. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 4 Learning Objectives (Cont’d) ► Know the advantages of prewritten software. ► Understand the different computer networking strategies. ► Understand how communications over the public telephone system and networks differ. ► Know about network protocols. ► Distinguish between intranets, extranets, and the Internet.
  • 5. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 5 Hardware & Processors ►Mainframes are large computers used for centralized information systems. ►Microcomputers or PCs are computers used by one person. ►Processor (CPU) is where data processing is performed. ►Processor speed is measured by the # of cycles that occur per second.
  • 6. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 6 Processors ►MHz stands for millions of cycles per second. ►Word is the measure of how many bits can be moved with one cycle of the processor. ►Word size is how many characters, “A”, can be moved in a single cycle of the processor. ►Power is affected by both word size & processor speed.
  • 7. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 7 Table 5.1 Major Computer Components
  • 8. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 8 Memory & Storage ►Memory (primary storage or RAM) is the storage area on the computer’s circuit board.  Volatile  Extremely fast ►Fixed storage is permanently installed in the computer. ►Removable storage media – tape, disk, CD, DVD, USB flash drive, etc.
  • 9. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 9 Figure 5.2 Motherboard
  • 10. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 10 Input Devices ►Human-captured data refers to input captured by a person typing on a keyboard, clicking a mouse, speaking into a microphone, or a similar interaction. ►Machine-captured data is data captured by an electronic or mechanical device. ►Point-of-sale terminals are scanners used in retail stores.
  • 11. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 11 Output Devices ►Monitor  Screen resolution, size 17-19’’ diagonals.  Graphic user interface (GUI). ►Printers  Lasers are like copier machines.  Ink-jets spray ink. ►Multimedia is the use of more than 1 medium at a time.
  • 12. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 12 Personal Computing Devices ►Cell phones with interactive messaging & video ►Smart cell phones are phones that perform tasks associated with PCs i.e. BlackBerry 7270, Treo 650. ►Global Systems for Mobile Communications (GSM) digital cellular phone protocol.
  • 13. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 13 Home Networks ►Home computer networks assess the Internet via cable modems or DSL modems. ►Setup usually requires the modem, network card(s), wireless router. ►Wireless security uses Wired equivalent privacy (WEP) which encrypts the data transferred between the computer & wireless router.
  • 14. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 14 Home Computing Security ►Updates for OS an application software.  For security & efficiency.  Microsoft Update. ►Hackers are people who try to break into computer systems in order to  Gather information;  Deny the owner access to his resources;  Delete files;  Disrupt the use by the owner.
  • 15. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 15 Home Computing Security (Cont’d) ►Viruses are small computer programs that replicate by inserting themselves into computer resources such as programs or files. ►Worms are self-contained files or programs  Does not have to attach to program or file.  Can delete, change files, send e-mails, and cause problems.
  • 16. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 16 Home Computing Security (Cont’d) ►Denial-of-service attack is when the user is denied access to the services of the computer because it is overwhelmed with e- mail. ►Antivirus software – Norton, MacAfee, etc. Keep virus definitions updated ►Spyware – Microsoft Defender, Lavasoft Ad-Aware, etc. Free from Microsoft.
  • 17. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 17 Software ►System software (OS) performs certain tasks that all computers require.  Hardware interfaces, device drivers.  Manage computer’s processes.  OS – Windows XP, Unix, Mac OS X, Linux. ►Application software processes the user’s data. ►Prewritten application software is produced by suppliers and sold to users.
  • 18. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 18 Application Software ►Custom application software is when programmers for the business write the software. ►User-written software in End-User Computing is created by the user, such as Excel Macros, Access Wizards. ►User-friendly software is computer software that is simple & intuitive to use.
  • 19. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 19 Communications ►Protocol is the specification for formatting data to be transferred between communications equipment. ►Public connections  Telephone modems  Integrated Services Digital Network (ISDN)  Digital Subscriber Line (DSL)
  • 20. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 20 Table 5.4 Connecting to the Internet
  • 21. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 21 Communications (Cont’d) ►Packet is a piece of the total data to be communicated, includes sender & receiver addresses. ►Cable modems connect to the Internet via coaxial cable. ►Asynchronous transfer mode (ATM)  Improve data transmission rates.  Increased speed.
  • 22. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 22 Private Line ►Circuit is a connection that is always connected. ►Private line is a circuit that is always open to your communication traffic.  T-1 line over 1.5 Mbps; T-3 at 43 Mbps.  Multiplexed is when the line is broken into separate lanes of communication.
  • 23. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 23 Virtual Private Networks ► Virtual Private Networks (VPNs) allow you to use the security & speed of a private line but still use the low-cost Internet. ► Tunneling software establishes the set of intermediary locations of the telephone equipment that will host a given data communications transfer. ► Privacy is attained because the tunnel is not established unless the sending & receiving computers authenticate one another.
  • 24. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 24 Communications - Networks ► Open Systems Interconnection (OSI) standard architecture for network connections established by the ISO. ► Terminal is a device that has no storage or processor; it allows for entering & displaying data for the computer. ► Systems Network Architecture (SNA) is a protocol for large computers; it polls other computers connected by the network for transfers.
  • 25. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 25 Table 5.5 OSI Reference Model
  • 26. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 26 Networks (Cont’d) ►Token ring is a peer-to-peer protocol that allows each computer to act as its own controller. ►Ethernet is an open protocol for peer-to- peer communications.  IEEE endorses ►Data transmission crash is when two peer computers try to send data at the same time.
  • 27. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 27 Figure 5.11 Token Ring Protocol Example
  • 28. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 28 Networks (Cont’d) ►Data packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information. ►Transmission Control Protocol/Internet Protocol (TCP/IP)  TCP conducts communication over the network.  IP handles the packets so they can be routed.
  • 29. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 29 Networks (Cont’d) ►IP address is a four-part set of numbers (each from 0 to 255), separated by periods. ►Network interface card (NIC) is used to attach a device to the communications medium. ►Local Area Networks (LANs) is a group of computers and other devices that are connected together by a communications medium.
  • 30. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 30 Table 5.6 Communications Network Hardware
  • 31. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 31 Networks (Cont’d) ►Medium used by LANs can be copper wire, wireless, fiber-optics, or other media. ►LANs join computers that are physically located together.  Same room or building.  Total distance is less than ½ mile.  60 ft. between devices.
  • 32. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 32 Networks (Cont’d) ►Metropolitan area network (MAN) is a network that has a physical distance limit of roughly 30 miles. ►Wide are networks (WANs) are used to connect computers and other devices when the distance exceeds the constraints of LANs & MANs.  Uses common carrier, public telephone system.  WANs have been replaced by the Internet.
  • 33. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 33 Internet, Intranet & Extranet ►Internet is just a collection of networks that can be joined together; Public. ►Intranet uses the same network protocols as the Internet but limits accessibility to computer resources to a select group of persons in the organization. ►Extranet is when the intranet is expanded to include users beyond the firm; Trusted customers & business partners.
  • 34. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 34 Convergence of Computing & Communications ►Computing devices & communications devices are now incorporating features of the other into themselves. ►Voice over Internet Protocol (VoIP) is the routing of voice communications over the Internet as if they were digital communications.  WWW.SKYPE.COM – free software
  • 35. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 35 Mainframe Computer
  • 36. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 36 Personal Computer (PC)
  • 37. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 37 PC System
  • 38. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 38 Static RAM / SRAM Dinamic RAM / DRAM EDORAM (Extended Data Out RAM ) 72 pin SDRAM 168 pin PROM EPROM EEPROM Memory
  • 39. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 39 Hard disk Removable Storage Floppy disk Floppy drive CD Flash disk
  • 40. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 40 Cylinder, sector, track pada harddisk
  • 41. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 41 Hard disk layout
  • 42. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 42 Input Device Keyboard Mouse
  • 43. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 43 Monitor
  • 44. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 44 Printer & Plotter Printer Dot Matrik Printer Ink Jet Plotter